The present disclosure teaches a method of utilizing image “match points” to measure and detect changes in a physical object. In some cases “degradation” or “wear and tear” of the physical object is assessed, while in other applications this disclosure is applicable to measuring intentional changes, such as changes made by additive or subtractive manufacturing processes, which may, for example, involve adding a layer or removing a layer by machining. A system may include a scanner, and a digital fingerprinting process, coupled to an object change computer server. The server is coupled to a datastore that stores class digital fingerprints, selected object digital fingerprints collected over time, match measurements, and deterioration metrics.

Patent
   10963670
Priority
Feb 06 2019
Filed
Feb 03 2020
Issued
Mar 30 2021
Expiry
Feb 03 2040
Assg.orig
Entity
Small
0
273
currently ok
10. A method comprising:
inducting a physical object in a known initial condition into a digital fingerprinting system, wherein inducting the physical object includes generating and storing a first digital fingerprint of the object as a reference digital fingerprint at a first time;
at a second time after the first time, generating and storing a second digital fingerprint of the object;
comparing the second digital fingerprint to the reference digital fingerprint to form a first comparison;
determining a metric of change of the object between the first time and the second time based on the first comparison;
comparing the metric of change to a predetermined threshold value; and
taking a predetermined action responsive to the comparison to the threshold value.
17. A system comprising:
means to receive or generate digital fingerprints of physical objects, wherein each digital fingerprint is based on at least one digital image of the corresponding physical object and includes data based on the digital image(s) that describe plural points of interest found on or near a surface of the corresponding physical object;
an object change server coupled to the input means and including a processor;
a datastore operatively coupled to the object change server; and
a user interface operatively coupled to the object change server;
wherein the processor has access to a memory storing machine-readable instructions executable on the processor, the instructions arranged to cause the processor to:
store a first digital fingerprint received from the input means into the datastore;
query the datastore to access a second digital fingerprint that matches the first digital fingerprint;
compare the first digital fingerprint to the second digital fingerprint to form a comparison;
determine a measure of change to the physical object based on the comparison;
generate an output to the user interface based on the measure of change.
1. A method comprising:
selecting a set of physical objects that are all members of a class of objects that have at least a predetermined number of points of interest in common, wherein the points of interest of each object are identified by a digital fingerprinting process that extracts surface or near-surface features, based on digital image data of the corresponding object;
generating a class digital fingerprint for the class of objects, the class digital fingerprint containing the common points of interest;
selecting an object that is a member of the class of objects but is not a member of the selected set;
at a first time, creating a first digital fingerprint of the selected object;
comparing the first digital fingerprint of the selected object to the class digital fingerprint to form a first comparison;
determining a first measure of match based on the first comparison, wherein the first measure of match is based on counting a number of points of interest found in the first digital fingerprint that match corresponding points of interest in the class digital fingerprint;
recording the first measure of match;
at a second time, creating a second digital fingerprint of the selected object;
comparing the second digital fingerprint to the class digital fingerprint to form a second comparison;
determining a second measure of match based on the second comparison, wherein the second measure of match is based on counting a number of points of interest found in the second digital fingerprint that match corresponding points of interest in the class digital fingerprint;
comparing the first and second measures of match to determine a deterioration of match metric; and
calculating and storing a measure of change of the selected object during a time period between the first time and the second time based on the deterioration of match metric.
2. The method of claim 1 wherein creating the first and second digital fingerprints includes extracting a least one location of interest in the corresponding digital image data, the location of interest based on the image data and not selected at random, generating feature vectors based on the at least one location of interest, and using the feature vectors to form the digital fingerprint.
3. The method of claim 2 further comprising:
comparing the measure of change of change of the object to a predetermined threshold change value; and
executing a predetermined action in a case that the measure of change exceeds the predetermined threshold change value.
4. The method of claim 2 wherein the comparing the first/second digital fingerprint to the class digital fingerprint are based on counting a number of points of interest found in the first/second digital fingerprint that match corresponding points of interest in the class digital fingerprint.
5. The method of claim 4 wherein matching points of interest are determined by: calculating a feature vector distance between each point of interest and a corresponding point of interest in the class digital fingerprint; and designating as matching those points of interest where the feature vector distance is less than a predetermined threshold value.
6. The method of claim 1 including:
storing the digital fingerprints of the first physical object in a datastore;
adding to each of the stored digital fingerprints corresponding metadata including a date-time stamp and geographic location data where image data was captured to form the digital fingerprint;
based on the stored digital fingerprints and the metadata, building a conceptual map of geographic locations where changes to the object have occurred; and
generating output to a user interface based on the conceptual map.
7. The method of claim 1 including:
comparing the measure of change to a predetermined threshold value; and
selecting and executing an action based on the comparison.
8. The method of claim 1 including:
identifying among the class members certain points of interest that occur (up to invariances) at the same or a very similar location in the corresponding digital fingerprints; and
designating as points of interest in the class digital fingerprint only those certain points of interest that occur in more than about 14 of the class members.
9. The method of claim 1 wherein the class of physical objects is a coin, and the set of physical objects comprises a plurality of individual coins all having a common issuer face value, year, and design.
11. The method of claim 10 wherein the physical object is undergoing a manufacturing process, and further comprising transmitting a feedback message to the manufacturing process based on the metric of change to the physical object.
12. The method of claim 11 including:
determining a conclusion of the processing of the physical object to form a finished physical object; and
inducting the finished physical object into the database system.
13. The method of claim 11 wherein the processing is an additive process, whereby some points of interest of the object are covered and therefore disappear from a given induction relative to an earlier induction, and the method further includes:
assessing progress of the additive process based on at least one of the stored measures of change to the object; and
adjusting the processing of the physical object based on the assessment.
14. The method of claim 13 wherein the additive process includes plating material onto the physical object.
15. The method of claim 10 and further comprising:
inducting a set of objects;
follow the set of objects through their life cycle, capturing the metrics of change as time passes until at least some of the set of objects are designated to be replaced;
identifying the captured metrics of change of the objects designated to be replaced; and determining the threshold value based on the identified metrics.
16. The method of claim 15 including:
determining an average value of the captured metrics of change of the objects designated to be replaced; and
utilizing the average value as the threshold value.
18. The system of claim 17 wherein:
the first digital fingerprint is extracted from a first physical object is a member of a class of objects having common points of interest;
the second digital fingerprint is a class fingerprint based on a set of objects that are all members of the class;
whereby the output indicates a change of the first physical object relative to the class digital fingerprint.
19. The system of claim 17 wherein the instructions are further arranged to cause the processor to:
receive or generate at least one additional digital fingerprint of the first physical object, wherein the additional digital fingerprint is based on image data of the first physical object that is acquired by a scanner at second time that is subsequent to a first time when the first digital fingerprint was acquired;
compare the additional digital fingerprint to the second digital fingerprint to form a second comparison;
determine a second measure of change to the physical object based on the second comparison; and
generate an output to the user interface based on the first and second measures of change.
20. The system of claim 19 wherein the output to the user interface includes an of wear of the physical object between the first time and the second time.

This application is a non-provisional of and claims priority, pursuant to 35 U.S.C. § 119(e), to U.S. Application No. 62/802,177, filed Feb. 6, 2019 (ref. 0680-P), hereby incorporated by reference as though fully set forth.

© Alitheon, Inc. 2019-2020. A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, if and when they are made public, but otherwise reserves all copyright rights whatsoever. 37 CFR § 1.71(d).

This application pertains to methods, systems, and software for detecting and measuring changes over time to physical objects, through the use of digital fingerprints.

It is often necessary or desirable to determine whether or not a physical object has changed from a prior state and, in certain cases, to determine how much a physical object has changed from a prior state. The need remains to reliably identify objects, detect and measure changes in the object over time, and from those changes assess authenticity, provenance, quality, condition, and/or degradation over time.

The following is a summary of the present disclosure to provide a basic understanding of some features and context. This summary is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. Its sole purpose is to present some concepts of the present disclosure in simplified form as a prelude to a more detailed description that is presented later.

In one embodiment, a system comprises a combination of digital fingerprint techniques, processes, programs, and hardware to enable a method of utilizing image “match points” to measure and detect changes in a physical object. In some cases “degradation” or “wear and tear” of the physical object is assessed, while in other applications this disclosure is applicable to measuring intentional changes, such as changes made by additive or subtractive manufacturing processes, which may, for example, involve adding a layer or removing a layer by machining. A system may include a scanner, and a digital fingerprinting process, coupled to an object change computer server. The object change computer server may be coupled to a datastore that stores class digital fingerprints, selected object digital fingerprints collected over time, match measurements, and deterioration metrics.

Additional aspects and advantages of the present disclosure will be apparent from the Detailed Description, which proceeds with reference to the accompanying drawings.

To enable the reader to realize one or more of the above-recited and other advantages and features of the present disclosure, a more particular description follows by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the disclosure and are not therefore to be considered limiting of its scope, the present disclosure will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:

FIG. 1 is a simplified block diagram of one example of a system to detect and measure changes in physical objects using digital fingerprints.

FIG. 2 is an image of a portion of a dollar bill with digital fingerprinting points of interest superimposed as circles on the image.

FIG. 3 is an image of a portion of a turbine blade with digital fingerprinting points of interest superimposed as circles on the image.

FIG. 4 is a simplified flow diagram illustrating a first process to detect and measure degradation in physical objects using digital fingerprints.

FIG. 5 is a simplified flow diagram of a second process to detect and measure degradation in physical objects using digital fingerprints.

It is often necessary or desirable to determine whether or not a physical object has changed from a prior state and, in certain cases, to determine how much a physical object has changed from a prior state. The present disclosure teaches a method of utilizing image “match points” to measure and detect changes in a physical object. While some aspects of the results presented herein may be achieved by examining changes in images that are not changes in match points, existing image-based approaches are significantly less general (for additive as well as subtractive processes, for example), and thus more limited, than the methods taught in this disclosure.

In this disclosure, frequent reference is made to “degradation” or “wear and tear” but the teachings of this disclosure are equally applicable to measuring intentional changes, such as changes made by additive manufacturing processes, which may, for example, involve adding a layer or removing a layer by machining, and any other processes that result in changes to the state of an object.

One aspect of this disclosure is the use of measured changes in a digital fingerprint of an object as a measure of its actual change from its initial conditions, or any prior condition. The techniques are primarily described in relation to measuring wear and tear and determining that an object should be replaced, but the techniques described here also have applicability in measuring the effects of other changes such as the effectiveness of anodizing a surface or an additive manufacturing process in, for example, adding a layer or a feature to an object under construction—or to any occurrence that results in a change in or to the material substance of a physical object. The methods taught in the present disclosure may also be applied to the grading of objects, such as of a coin, based on a degradation of the object from a standard. One application of the taught method is determining when a currency note has degraded to a such degree that it needs to be recycled.

As will be shown, the measured degradation may be from a digital fingerprint created at an earlier stage of the object itself or from a standard representative of the kind (class) of object being measured, or by other means. This standard may be, for example, a particular object, a physical or digital model, or it may be an aggregate of many objects of the same class. The concept of measured degradation will be further elaborated below.

During the creation and/or use of various physical goods, it is often necessary or desirable to determine that a physical good or object has changed from some prior state—and to determine how much it has changed or in what manner it has changed. This disclosure teaches a method for using digital fingerprints to determine and measure various object changes in a wide range of physical objects and under a range of conditions. Examples will be given where the change is one of wear-and-tear, corrosion, ablation, or other essentially subtractive processes—where the surface elements are gradually removed. Equally important are changes to the surface that occur through additive processes, such as a step in an additive manufacturing process, or a person's addition of makeup to his or her face. The additive conditions, the subtractive conditions, and conditions where both addition and subtraction take place at the same time or in succession (e.g. abrasion, corrosion, and patination) are in view of this disclosure.

Wear and tear generally refers to changes in the surface or near-surface conditions that may be seen through electromagnetic interaction. Note that the use of any part of the electromagnetic spectrum is in view of this disclosure, although most of the examples will involve visible light. No particular method of extracting digital fingerprints is required for this disclosure. However, the methods chosen will need to be ones that extract the digital fingerprints from the surface or near-surface features of the material substance of a physical object. In the present disclosure, the term “surface” will mean surface or near-surface.

Wear and tear as defined in this disclosure consists of progressive changes in the surface characteristics of a physical object. The changes may be of many kinds including abrasion, creasing, soiling, aging, oxidizing, physical and/or chemical weathering, or any other progressive change, including intentional changes such as plating. It is not to be implied that changes to an object are necessarily negative or are indications of damage. Some of the embodiments discussed below involve an object “improving” (e.g. bringing the object closer to completion of the manufacturing process). Since digital fingerprints of the type described are derived from surface characteristics of an object, changes in the surface characteristics may be quantified by measuring changes in digital fingerprints of the surface.

In this disclosure, frequent reference will be made to matching a digital fingerprint created at one point in time with a digital fingerprint created at a different point in time and using the degree of match as a component in the system. The matching may be done in various ways. As an example, an embodiment may carry out the matching of a plurality of digital fingerprints by calculating a simple threshold feature vector distance for each point of interest. Those closer than the threshold could be deemed to be a “match”. Other known types of calculations may be employed. See the description of Digital Fingerprinting, below, for more detail.

The technology disclosed herein may differentiate between several types of changes in physical objects (based on the way the points of interest change) and provide a measurement not only of overall change but of different types or categories of changes. Some examples, mentioned elsewhere in this disclosure, include distinguishing and measuring additive and subtractive changes separately. Those examples are given but any kind of change that can be isolated based on digital fingerprinting is in view of the taught system.

While this disclosure is not limited to the use of visible light, most of the examples given use visible light. In most instances, the taught technology enables the use of visible light with no special equipment, which means that the hardware required to run the system may in many cases be consumer-level electronics (e.g. a smart phone). The ability to use relatively inexpensive equipment provides a considerable benefit over current approaches, many of which require specialized and often expensive equipment.

In view in the disclosure is the ability of multiple users at different times and places to contribute to a conceptual map of where (or when, how, why, etc.) changes to an object occur, which may enable a better understanding of the history of the object and for that history to be recorded. For example, the system of FIG. 1 illustrates use of a remote system and smartphone (172) camera to capture image data of a physical object at virtually any time and location. Also, the taught system may enable the detection of places where, for example, excessive wear is occurring, thereby enabling possible fixes. Thus, the teachings of this disclosure may apply throughout a manufacturing process but also through any process (such as a distribution network) wherein the object is handled and may undergo intentional or unintentional change.

FIG. 1 is a simplified block diagram of one example of a system to detect and measure changes in physical objects using digital fingerprints. In this example, a set of physical objects 100 of the same class are collected. The objects are presented one at a time into the field of view of a suitable imager (scanner, camera, etc.) 102 to acquire image data. The image data is input to a digital fingerprinting process 104 to form a digital fingerprint for each object. The digital fingerprinting process 104 may be integrated into the imager, stored in the server 110, etc. It can be a remote process. The resulting set of digital fingerprints are provided via path 112 to an object change server 110. Any suitable computer server can be provisioned to function as an object change server. It may be local or provisioned “in the cloud.” In this example, the server 110 is coupled by its communications component 150 to a network 160 which may be LAN, WAN, internet, etc. Almost any digital networking hardware and communication protocols can be used.

A remote induction process 162 may be provisioned and coupled to the server 110 via the network 160. This enables inducting, i.e., capturing image data of an object from a remote location, and adding the corresponding digital fingerprint of the remote object, to the server 110. The server 110 may store digital fingerprint in a coupled datastore 116, which again may be local or provisioned in the cloud. The object change server 110 can store data in the datastore 116 including digital fingerprint data, to accomplish the functions described herein. For example, the datastore can maintain class digital fingerprints, individual (selected object) digital fingerprints, including multiple versions over time; reference object or digital fingerprints or digital models of an object.

The matching process can be carried out, for example, by an analysis component 144. It may use a query manager 142 to access various records as needed in the datastore 116. Results such as match measurements, deterioration metrics, and object histories and be stored and update in the datastore. In one scenario, a remote user 170 may capture an object image using a smartphone 172. The image data can be used to generate a corresponding digital fingerprint, locally on the phone, or in the user system 170, or a remote induction component 162, or at the server 110. The object digital fingerprint can be stored in the datastore. It can be used to query the datastore to find a matching record from an earlier induction. It can be used to compare to that earlier record, to determine changes, and optionally to update the object history.

Objects with Substantially Similar Background Features

Two categories of objects are considered: First, those that are members of a group of similar objects where a substantial portion of the digital fingerprint of an individual object is shared by the similar objects; and second, those objects where there is no such sharing. Whether or not an object shares a “substantial portion” of the digital fingerprint with another may be measured by a threshold value, may be defined by a model or a template, or determined by some other means of measure. Shared or potentially-shared portions of digital fingerprints are, for the purposes of this disclosure, called “background features,” although the name is not critical or to be taken literally. In general (though not exclusively) the background features make different members of the group look similar even at fairly detailed levels of examination. A “fairly detailed level of examination” of a physical object may utilize on the order of 5-10× magnification, although these values are not critical. An example of a set of objects that has significant background features are currency bills. In fact, background features are commonly intentionally-added characteristics in paper currency. For example, in the case of a dollar bill, its background features are consistent enough to distinguish a one-dollar bill from a twenty-dollar bill and would include such components as Washington's face and the numerical “1” at the four corners of the bill.

FIG. 2 is an image of a portion of a dollar bill with digital fingerprinting points of interest identified by superimposed circles on the image. In this example, the points of interest are almost entirely located around “background” features. In one embodiment, the size of an individual superimposed circle reflects the size of the point of interest. That is, the size of the circle is proportional to the scale at which the corresponding point of interest was found. The scale of a point of interest is the size of the radius around a point at which the Laplacian function (used to locate the point of interest) is strongest as one varies the size of the region.

In more detail, in one embodiment, the Laplacian is used to calculate the curvature at each point on the surface. To do this, the Laplacian requires two things: it needs to know the point at its center and it needs to know how far out to look when calculating it. The latter is the “scale” of the Laplacian. One may pass a Laplacian of a given scale over the surface and choose as the location of the points of interest the local (absolute value of the) maximum of the Laplacian. This is done for various scales. At a given point, as the Laplacian scale goes from very small to very large (over a pre-specified range of scales) there is some scale where its absolute value is largest. That value of the scale is then chosen. The point of interest circle indicates that scale.

The examples and descriptions provided here are not meant to be limiting in any way but rather to provide a clear visual of the kind of object being referred to. The digital fingerprints of currency bills often have points of interest whose locations are shared among many such bills and whose characterizing feature vectors are relatively similar as well. The reason for the similarity is that the object has features which are intentional features common to the group of objects and the digital fingerprinting process is finding those common features. In general, such points of interest are close physically (meaning they are located at the same point on each dollar bill) but vary in characterization (since things like paper fibers and ink bleeds cause the feature vectors of extracted digital features to vary significantly).

Objects that do not have Substantially Similar Background Features

The second category is objects that do not have significant shared background features. Machined part surfaces commonly fall into this category. To the naked eye, machined parts may appear to be extremely similar—for example, different brake pads of the same lot—but when viewed at a resolution that on a dollar bill would show, for example, the background features of George Washington's face, such different parts of the same kind show little or no common features. One reason is that, for example, machined part surfaces may consist primarily of casting or machining marks which show little or no commonality across members of the type of object.

FIG. 3 is an image of a portion of a turbine blade with digital fingerprinting points of interest superimposed as circles on the image. The image shows a section of a turbine blade. With very few exceptions, all the points marked on the photo are characteristics of the surface of the individual blade and not of a class of turbine blades. Very few exceptions may be seen along the dark line across the image. In many cases it is obvious what surface features are responsible for the point of interest. In this case, essentially all the points of interest are independent in both position and value (though obviously tied to the surface of the object). They are useful in identifying the individual turbine blade but useless in determining that the object is a turbine blade. Essentially all points of interest are dissimilar or “foreground” features.

In some embodiments, the image may be displayed in color to provide more information. The dark line is actually in the image. In one example, a first color may be used to display circles that are above a certain strength or threshold value (“strong points of interest”), while a second color may be used to show weaker points of interest, i.e., those below the threshold value. In another example, additional colors, for example, four or five colors, may be applied to points of interest circles in a visual display to show a (quantized) range of strength values. The “strength” of a point of interest is correlated to the ability to find it under different conditions of angle and illumination. The use of visual displays including circles (or other shapes), colors, etc. may help human users to understand the computerized processes at work.

Two different processes for detecting and measuring changes to an object are described in more detail below. Which process to apply depends on the category of objects to be considered. It should be kept in mind that while two distinct categories are described herein, in practice, objects generally fall within a range from one to the other. One example is coin grading, where both addition and subtraction may be equally important. While different approaches are described for the two categories, it is anticipated that for many objects a combination of approaches will be required.

The system taught herein works when the change is negative or subtractive—such as when parts of the surface abrade—as well as when the change is additive. In either case, the match with the reference digital fingerprint will degrade. In the former case, degradation is caused by removal of the surface feature that was characterized as a point of interest in the reference fingerprint. In the latter case, that surface feature has been covered over by an additive process.

In one embodiment of this disclosure, features common to multiple examples of a class of objects are identified and common points of interest are identified and characterized and then used for determining changes in members of that class of objects. At different times in the object's life cycle its digital fingerprint is compared with the digital fingerprint composed of the common points of interest and the change in correspondence to those common points measured and used as a measurement of the change in the object. This is particularly useful when the object being measured was not inducted (i.e. digitally fingerprinted) when new.

One advantage of the approach of using common points is the ability to produce a degradation measuring system that does not require that a particular object (of this kind) be inducted as a reference. Instead of measuring degradation of a particular object from its earlier induction, the degradation in the object's match with a group digital fingerprint comprising the common points is measured. An example of this type of process follows.

Process for a Class of Objects with a Substantial Number of Common Points of Interest

FIG. 5 is a simplified flow diagram of a method to detect and measure degradation in physical objects using digital fingerprints. A set of, preferably, new objects (although it is not strictly necessary that the objects be new) that are all members of a class with a substantial number of common points is selected, block 502. The size of the set is chosen such that adding more members does not significantly increase the number of common points. Each member object of the set is inducted, and its digital fingerprint is extracted. Though the digital fingerprint may contain many additional types of information, for the purposes of this disclosure, points of interest that have (up to invariances) the same, or very similar, location in multiple members of the class are considered. The exact number of times the point will occur in the class depends on the number of objects in the class-specific data set and the consistency and constitution of the background, but it has been found that, typically, if a point occurs in more than 14 members of such a class, it is likely to occur in a great deal more (if the class is large enough) and therefore is considered a common or “background” point or feature.

Meaning of “up to invariances”. It was stated above that the common points are in the same (or very similar) locations “up to invariances”. What this means depends on the type of invariance that the processing of the object achieves. Consider a dollar bill as an example. If an image of a dollar bill is always captured in the same orientation and with the same resolution, the common points of the dollar bill class will be in very nearly the same location in each image. If, however, the bill may be imaged in any orientation, the location of the common points is “the same” after correcting for the degree of rotation between member of the class. If the image can be captured at different resolutions, the common points are located in “the same location” up to a change in scale. Similar statements can be made for offset, affine, homography, projective, perspective, rubber sheet, and other variations. A point on one object is considered to be “in the same location” as a point on another object of the same class if, when a matching of digital fingerprints is performed, they are considered to be properly located for a match. In this description, when it is stated that two points on different class members are located in the same place, “up to invariances” should always be understood to be implied.

Now that a set of common points of interest are defined, a “class digital fingerprint” (or simply, “class fingerprint”) can be generated, so that the class fingerprint contains, preferably only, the common points of interest, block 504. The class fingerprint can be used for matching an object to a class (that is, for determining that a particular object is a member of a particular class whose class fingerprint the fingerprint of the object matches within a threshold). That is an important use, but it is not directly relevant to this section of the description. The class fingerprint may have all the points found (including, say, 15 of each located very close to each other), an average of the characteristics of each such point, or any other way of combining them. Significantly, when the process is completed, the outcome will include a set of points, many of which are likely to occur in any example of the object class.

For some applications, the selected set of objects should be objects that are as close as possible to a desired reference state. In many cases the preferred reference state will be “new”, but in the case of an object inducted previously in its life cycle, the reference state might be the same object (that is, the digital fingerprint of the same object) acquired and stored at an initial or earlier induction. As mentioned, the objects are compared with each other and the points of interest that are common to a significant number of them are preserved in a class fingerprint.

One benefit of having background features and using them to create a class fingerprint is that the degree of change of a member of the class may be determined without the individual object having been inducted when it was new. However well or poorly it matches the class fingerprint (compared to how well other items known to be worn out or in good condition matched and/or compared with its previous matches), measures the degree of wear.

Referring again to FIG. 5, next, a member of the class that was not part of the original set is selected, block 506. This selected member should preferably be in a known condition, preferably in “new” condition, although any condition may be of use. A (first) digital fingerprint of the selected member is acquired, block 508. That digital fingerprint is compared to the class fingerprint, block 510 and a measure of match is determined based on the comparison, block 512, and recorded, block 514. As the selected member experiences wear and tear, it is repeatedly measured against the class fingerprint. In FIG. 5, see block 516, creating a second digital fingerprint at a second time. Comparing the second digital fingerprint to the class digital fingerprint, block 518; determining a second measure of match, block 520; recording the second measure of match, block 522; and comparing the first and second measures of match to determine a deterioration of match metric, block 524.

The deterioration of the selected member's match to the class fingerprint is used as a measure or metric of its degree of change, see block 526. Determining that the object is worn out may either be done by training—that is, by seeing how much degradation other objects in the class have undergone before a human decides they are worn out—or by a predetermined loss of matching points between the object and the class digital fingerprint, or by some other method. When a sufficiently high level of degradation occurs in a tested object, the object is declared to be worn out. These processes may be realized in software, for example, in an analysis component 144 in the object change server 110 in FIG. 1.

Process for a Class of Objects without a Substantial Number of Common Points of Interest

In an embodiment an object is inducted when new (or other known state) and measurement of its change is based on how its own digital fingerprint changes from the originally-inducted one. That digital fingerprint may comprise only those points of interest that occur in this object (and not in similar objects) or it may comprise all points of interest on the object, or, comprise different subsets of such points.

It should be kept in mind that this approach may be used for any object whether or not it belongs to a class that has common points. It is possible the use of common points of interest (in the former embodiment) as well as individual object points of interest in a given application.

When there are few or no “common features” or “background features” creating a class digital fingerprint is impossible, so the approach of the previous section is also impossible. When everything is foreground (or treated as though it were foreground), the object must be inducted when the object is in a known condition, preferably when it is new, although any condition may be acceptable. Change, therefore, is measured as the change from the originally-inducted digital fingerprint. A turbine blade is one example, but this approach works for almost any object, including those with substantial background points or features.

In this case an object is inducted when in a known condition, preferably in “new” condition for measuring degradation, or, as another example, “prior to anodizing” if anodizing will be taking place, and so on. Later, when the object has been worn or anodized or otherwise altered, the object is inducted again to measure the difference in match points from when it was initially inducted.

FIG. 4 is a simplified flow diagram illustrating a method to detect and measure degradation in physical objects using digital fingerprints, without a class digital fingerprint. At block 402, the process calls for inducting a physical object in a known initial condition into a digital fingerprinting system. Inducting the physical object includes generating and storing a first digital fingerprint of the object at a first time, block 406. This may be called a reference digital fingerprint. Next comes re-inducting the object at a second or next time after the first time, to form a second or next digital fingerprint of the object, block 408. The second or next digital fingerprint is stored in the datastore, block 410. In this description and the claims, phrases like “a second/next digital fingerprint” and “a first/next comparison” etc. are used to indicate a repeating process, where the “next digital fingerprint” for example, would correspond to a second, third, fourth, etc. digital fingerprint as a repeating process or “loop” is executed. Such a loop is indicated in FIG. 4 from the decision 418 back to block 408.

At block 412, the process continues by comparing the second/next digital fingerprint of the object to a first/next preceding digital fingerprint to form a first/next comparison. Block 414 calls for determining a first/next measure of change of the object between the first/next time and the second/next subsequent time based on the first/next comparison. Block 416 calls for recording the first/next measure of change to accumulate measures of change of the object over time, namely, from the first time to the last (most recent) next time.

A decision 418 determines whether the manufacturing process has completed. If so, the process may terminate, block 422. If not, the illustrated method may provide feedback to the manufacturing process, block 420. That is, it may provide information based on changes to the object during the manufacturing process. for example, if a plating process is specified to continue until a certain measure of change is accomplished, the feedback may indicate that the measure of change has occurred and thus the plating process is completed. Assuming the process is not completed, the method loops back to block 408 to again re-induct the object.

Training

Determining how much measured change is sufficient to, say, remove a bill or turbine blade from service or show that the anodizing process has been successful can be done in various ways, any of which are in view in this disclosure. Two approaches are worth highlighting. First, a degree of change of the test digital fingerprint from the reference one may be set. To use the wear-and-tear example of a turbine blade, when, for example, half the points originally seen are no longer there to match the reference, that level of change may be defined as a prompt to replace the blade. This makes sense because half the points missing is indicative of half the surface having been substantially altered. In category one (the category with a large number of background points) it is indicative that half the points that make the object a dollar bill (or whatever) are missing so it may be time to recycle the bill. Note that the use of “half” here is purely arbitrary. The number of points may be set at any level and by any manner, including manually, as a result of experience, as a result of a training process, or by any other method.

The training process approach involves training the system to determine the action to take based on a given degree of change. Again, the wear and tear surface erosion example will be used, but the example is not meant to be limiting. One way to do the training is to induct a set of objects and follow them through their life cycle, measuring them as time passes until they are ready to be replaced. The degradation score at their points of replacement (or the aggregate or average of such scores) may then be used to define a norm or a standard. A more sophisticated training system may be envisioned where a neural net or other machine learning system is trained with objects at various parts of their life cycles and, after the training cycle is complete, the match of the object to the class digital fingerprint (first category) or to its initial induction (second category) is put into the learning system and the system indicates, for example, how much life is left in the object or that it is time to replace the object. A similar training system may be envisioned for use in additive processes as well.

Non-Limiting Sample Use Cases

In addition to the currency bill and turbine blade examples explored above, many other embodiments are possible. The teachings of this disclosure apply wherever measurement of change in the surface features of a physical object is useful.

Plating.

In addition to anodizing, mentioned above, other methods of obscuring the surface are in view. The obscuring may be unintentional or intentional. Plating is one example. Depending on how thick the plating is supposed to be, the object may be inducted once or many times in the plating process.

In an embodiment, an object's surface may need to be covered with new material that is too thick to see through. There are two uses for digital fingerprinting here. First, the teachings of this disclosure can be used to determine the progress and effectiveness of such additions. In this case, each time the previous surface “disappears” to some predetermined amount, the object is re-inducted, and a new reference preserved. When that surface in turn partially “disappears”, further induction is performed and so on until the addition process is complete. The second use is to re-induct the part when the new surface is finished so that, going forward, the part's identity can be established. As such, in this embodiment the teachings of this disclosure are used to both ensure the additive process is working correctly and, when that process is finished, to ensure that the system can continue to identify the part as it moves through further manufacturing stages.

Item Aging.

Aging here is a stand-in term for conditions where the object changes not because it is added to or abraded but simply as a result of the passage of time, its interaction with the environment, its regrowth/regeneration (such as in the case of skin or living material), and so on. In this case, surface points may be added or subtracted by the aging process and the degree of change measured not just in terms of points of interest lost but also points of interest that first appear between inductions.

Coin (and Other Object) Grading.

Many objects are graded to determine how closely they conform to a standard object. Coins are examples of this. In general, the more the coin is worn (in the case of circulated coins) or scarred by, say, other coins in a bag (uncirculated coins), the less well they will conform.

Coins are graded somewhat differently depending on their type. Proof coins are (generally) double stamped and stamped with mirrored dies. They are not meant for general circulation. Proof coins are graded from PR-60 to PR-70 (impaired or rubbed proof coins may have a lower grade). Uncirculated regular coins are coins that have never been in general circulation. Uncirculated coin grades run from MS-60 to MS-70, which correspond in quality and amount of degradation to the PR categories for proof coins.

Coins that have been in general circulation are graded in a range from 1 to 59. 50 and up are called “about uncirculated” (AU). 40-49 are “extremely fine” (XF). 20-39 are “very fine” (VF). Below that are “fine” (F), “very good” (VG), “good” (G), “about good” (AG), “fair” (FR), “poor” (P), and “ungradable”. Examples are given below.

Coins fit into the first category of objects with similar background features, described above as coins have a large quantity of shared “background” points. It is clear from the images that degradation from initial conditions depends on both addition (patina, scratch marks) and subtraction (wear marks). The taught system may be used to carry out coin grading by having coins graded by an expert and the digital fingerprint of the coins extracted. A learning system is then programmed based on the grade and the measured change from an ideal example of that coin type. When a coin of that type is to be graded, its digital fingerprint is extracted and additions and subtractions from the standard measured, the results fed through the learning system, and the grade produced.

Digital Fingerprinting

“Digital fingerprinting” refers to the creation and use of digital records (digital fingerprints) derived from properties of a physical object, which digital records are typically stored in a database. Digital fingerprints maybe used to reliably and unambiguously identify or authenticate corresponding physical objects, track them through supply chains, record their provenance and changes over time, and for many other uses and applications.

Digital fingerprints store information, preferably in the form of numbers or “feature vectors,” that describes features that appear at particular locations, called points of interest, of a two-dimensional (2-D) or three-dimensional (3-D) object. In the case of a 2-D object, the points of interest are preferably on a surface of the corresponding object; in the 3-D case, the points of interest may be on the surface or in the interior of the object. In some applications, an object “feature template” may be used to define locations or regions of interest for a class of objects. The digital fingerprints may be derived or generated from digital data of the object which may be, for example, image data.

While the data from which digital fingerprints are derived is often images, a digital fingerprint may contain digital representations of any data derived from or associated with the object. For example, digital fingerprint data may be derived from an audio file. That audio file in turn may be associated or linked in a database to an object. Thus, in general, a digital fingerprint may be derived from a first object directly, or it may be derived from a different object (or file) linked to the first object, or a combination of the two (or more) sources. In the audio example, the audio file may be a recording of a person speaking a particular phrase. The digital fingerprint of the audio recording may be stored as part of a digital fingerprint of the person speaking. The digital fingerprint (of the person) may be used as part of a system and method to later identify or authenticate that person, based on their speaking the same phrase, in combination with other sources.

Returning to the 2-D and 3-D object examples mentioned above, feature extraction or feature detection may be used to characterize points of interest. In an embodiment, this may be done in various ways. Two examples include Scale-Invariant Feature Transform (or SIFT) and Speeded Up Robust features (or SURF). Both are described in the literature. For example: “Feature detection and matching are used in image registration, object tracking, object retrieval etc. There are number of approaches used to detect and matching of features as SIFT (Scale Invariant Feature Transform), SURF (Speeded up Robust Feature), FAST, ORB etc. SIFT and SURF are most useful approaches to detect and matching of features because of it is invariant to scale, rotate, translation, illumination, and blur.” MISTRY, Darshana et al., Comparison of Feature Detection and Matching Approaches: SIFT and SURF, GRD Journals—Global Research and Development Journal for Engineering|Volume 2|Issue 4|March 2017.

In an embodiment, features may be used to represent information derived from a digital image in a machine-readable and useful way. Features may be point, line, edges, and blob of an image etc. There are areas as image registration, object tracking, and object retrieval etc. that require a system or processor to detect and match correct features. Therefore, it may be desirable to find features in ways that are invariant to rotation, scale, translation, illumination, noisy and blur images. The search of interest points from one object image to corresponding images can be very challenging work. The search may preferably be done such that same physical interest points can be found in different views. Once located, points of interest and their respective characteristics may be aggregated to form the digital fingerprint (generally including 2-D or 3-D location parameters).

In an embodiment, features may be matched, for example, based on finding a minimum threshold distance. Distances can be found using Euclidean distance, Manhattan distance etc. If distances of two points are less than a prescribed minimum threshold distance, those key points may be known as matching pairs. Matching a digital fingerprint may comprise assessing a number of matching pairs, their locations or distance and other characteristics. Many points may be assessed to calculate a likelihood of a match, since, generally, a perfect match will not be found. In some applications an “feature template” may be used to define locations or regions of interest for a class of objects.

Scanning

In this application, the term “scan” is used in the broadest sense, referring to any and all means for capturing an image or set of images, which may be in digital form or transformed into digital form. Images may, for example, be two dimensional, three dimensional, or in the form of a video. Thus a “scan” may refer to an image (or digital data that defines an image) captured by a scanner, a camera, a specially adapted sensor or sensor array (such as a CCD array), a microscope, a smartphone camera, a video camera, an x-ray machine, a sonar, an ultrasound machine, a microphone (or other instruments for converting sound waves into electrical energy variations), etc. Broadly, any device that can sense and capture either electromagnetic radiation or mechanical wave that has traveled through an object or reflected off an object or any other means to capture surface or internal structure of an object is a candidate to create a “scan” of an object. Various means to extract “fingerprints” or features from an object may be used; for example, through sound, physical structure, chemical composition, or many others. The remainder of this application will use terms like “image” but when doing so, the broader uses of this technology should be implied. In other words, alternative means to extract “fingerprints” or features from an object should be considered equivalents within the scope of this disclosure. Similarly, terms such as “scanner” and “scanning equipment” herein may be used in a broad sense to refer to any equipment capable of carrying out “scans” as defined above, or to equipment that carries out “scans” as defined above as part of their function.

More information about digital fingerprinting can be found in various patents and publications assigned to Alitheon, Inc. including, for example, the following: DIGITAL FINGERPRINTING, U.S. Pat. No. 8,6109,762; OBJECT IDENTIFICATION AND INVENTORY MANAGEMENT, U.S. Pat. No. 9,152,862; DIGITAL FINGERPRINTING OBJECT AUTHENTICATION AND ANTI-COUNTERFEITING SYSTEM, U.S. Pat. No. 9,443,298; PERSONAL HISTORY IN TRACK AND TRACE SYSTEM, U.S. Pat. No. 10,037,537; PRESERVING AUTENTICATION UNDER ITEM CHANGE, U.S. Pat. App. Pub. No. 2017-0243230 A1. These references are incorporated herein by this reference.

The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.

The system and method disclosed herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements. When implemented as a system, such systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers. In implementations where the innovations reside on a server, such a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.

Additionally, the system and method herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above. With regard to such other components (e.g., software, processing components, etc.) and/or computer-readable media associated with or embodying the present disclosure, for example, aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations. Various exemplary computing systems, environments, and/or configurations that may be suitable for use with the innovations herein may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.

In some instances, aspects of the system and method may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example. In general, program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular instructions herein. The disclosures may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.

The software, circuitry and components herein may also include and/or utilize one or more type of computer readable media. Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component. Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.

In the present description, the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways. For example, the functions of various circuits and/or blocks can be combined with one another into any other number of modules. Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein. Or, the modules can comprise programming instructions transmitted to a general-purpose computer or to processing/graphics hardware via a transmission carrier wave. Also, the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein. Finally, the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.

As disclosed herein, features consistent with the disclosure may be implemented via computer-hardware, software and/or firmware. For example, the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed implementations describe specific hardware components, systems and methods consistent with the innovations herein may be implemented with any combination of hardware, software and/or firmware. Moreover, the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments. Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the present disclosure or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality. The processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware. For example, various general-purpose machines may be used with programs written in accordance with teachings of the present disclosure, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.

Aspects of the method and system described herein, such as the logic, may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits. Some other possibilities for implementing aspects include memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc. Furthermore, aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. The underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (“MOSFET”) technologies like complementary metal-oxide semiconductor (“CMOS”), bipolar technologies like emitter-coupled logic (“ECL”), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.

It should also be noted that the various logic and/or functions disclosed herein may be enabled using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) though again does not include transitory media. Unless the context clearly requires otherwise, throughout the description, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.

Although certain presently preferred implementations of the present disclosure have been specifically described herein, it will be apparent to those skilled in the art to which the present disclosure pertains that variations and modifications of the various implementations shown and described herein may be made without departing from the spirit and scope of the present disclosure. Accordingly, it is intended that the present disclosure be limited only to the extent required by the applicable rules of law.

While the foregoing has been with reference to a particular embodiment of the disclosure, it will be appreciated by those skilled in the art that changes in this embodiment may be made without departing from the principles and spirit of the disclosure, the scope of which is defined by the appended claims.

Ross, David Justin, Qian, Cheng, Shannon, Will Charles

Patent Priority Assignee Title
Patent Priority Assignee Title
10037537, Feb 19 2016 Alitheon, Inc.; ALITHEON, INC Personal history in track and trace system
10043073, Mar 02 2011 ALITHEON, INC Document authentication using extracted digital fingerprints
10192140, Mar 02 2012 ALITHEON, INC Database for detecting counterfeit items using digital fingerprint records
10199886, Sep 01 2015 JOHNSON ELECTRIC INTERNATIONAL AG Single phase brushless motor and power tool utilizing same
10346852, Feb 19 2016 Alitheon, Inc.; ALITHEON, INC Preserving authentication under item change
10540664, Feb 19 2016 Alitheon, Inc. Preserving a level of confidence of authenticity of an object
4218674, Sep 09 1975 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
4423415, Jun 23 1980 LIGHT SIGNATURES, INC , FORMERLY NEW LSI, INC , 1901 AVENUE OF THE STARS, LOS ANGELES CA 90067 A CORP OF CA Non-counterfeitable document system
4677435, Jul 23 1984 Communaute Europeenne de l'Energie Atomique (Euratom); Association pour la Promotion de la Technologie (Promotech) Surface texture reading access checking system
4921107, Jul 01 1988 Pitney Bowes Inc. Mail sortation system
5031223, Oct 24 1989 INTERNATIONAL BUSINESS MACHINES CORPORATION, A CORP OF NY System and method for deferred processing of OCR scanned mail
5079714, Oct 03 1989 Pitney Bowes Inc.; PITNEY BOWES INC , WORLD HEADQUARTERS, CT A CORP OF DE Mail deliverability by mail and database processing
5393939, Nov 20 1992 Northrop Grumman Corporation Apparatus and method for weighing moving objects
5422821, Apr 06 1992 SIEMENS INDUSTRY, INC Apparatus for intercepting and forwarding incorrectly addressed postal mail
5514863, Jan 08 1993 BOARD OF REGENTS OF THE UNIVERISTY OF NEBRASKA Return mail piece and method of marking the same
5518122, Aug 09 1991 Northrop Grumman Corporation Modular mail processing method and control system
5703783, Apr 06 1992 Siemens Logistics LLC Apparatus for intercepting and forwarding incorrectly addressed postal mail
5719939, Jun 15 1990 UNICATE B V System and method of verifying the legitimacy of a product against forgery
5734568, Aug 21 1992 IBM Corporation Data processing system for merger of sorting information and redundancy information to provide contextual predictive keying for postal addresses
5745590, Aug 08 1996 Qwest Communications International Inc Closed loop mail piece processing method
5883971, Oct 23 1996 PENDRAGON NETWORKS LLC System and method for determining if a fingerprint image contains an image portion representing a smudged fingerprint impression
5923848, May 31 1996 Microsoft Technology Licensing, LLC System and method for resolving names in an electronic messaging environment
5974150, Sep 30 1997 Copilot Ventures Fund III LLC System and method for authentication of goods
6246794, Dec 13 1995 HITACHI-OMRON TERMINAL SOLUTIONS CORP Method of reading characters and method of reading postal addresses
6292709, Oct 24 1996 Siemens Aktiengesellschaft Method and device for online processing of forwarding mail
6327373, Feb 18 1998 Kabushiki Kaisha Toshiba Mail address reading apparatus and mail sorting apparatus
6343327, Nov 12 1997 Pitney Bowes Inc System and method for electronic and physical mass mailing
6360001, May 10 2000 International Business Machines Corporation Automatic location of address information on parcels sent by mass mailers
6370259, Feb 04 2000 DRS SUSTAINMENT SYSTEMS, INC Automatic address extractor
6424728, Dec 02 1999 Method and apparatus for verification of signatures
6434601, Mar 31 1999 Round Rock Research, LLC Pre test electronic mail process
6470091, Feb 10 1998 HITACHI-OMRON TERMINAL SOLUTIONS CORP Address reader, sorting machine such as a mail thing and character string recognition method
6539098, Sep 24 1999 DMT Solutions Global Corporation Mail processing systems and methods
6549892, May 21 1999 Pitney Bowes Inc. System for delivering mail
6697500, Mar 11 2002 Bell and Howell, LLC Method and system for mail detection and tracking of categorized mail pieces
6741724, Mar 24 2000 Siemens Logistics LLC Method and system for form processing
6768810, May 04 2000 KÖRBER SUPPLY CHAIN LOGISTICS GMBH System and method for detecting address fields on mail items
6778703, Apr 19 2000 International Business Machines Corporation Form recognition using reference areas
6805926, Feb 23 2001 CRANE SECURITY TECHNOLOGIES, INC Security label having security element and method of making same
6816602, Mar 01 2001 Lockheed Martin Corporation System and method of deferred postal address processing
6829369, May 18 2001 Lockheed Martin Corporation Coding depth file and method of postal address processing using a coding depth file
6961466, Oct 31 2000 Matsushita Electric Industrial Co., Ltd. Method and apparatus for object recognition
6985925, Aug 24 2000 OL SECURITY LIMITED LIABILITY COMPANY Server device and method for providing e-mail service, and information recording medium recording a program for realizing the service
6985926, Aug 29 2001 CHARTOLEAUX KG LIMITED LIABILITY COMPANY Method and system for matching and consolidating addresses in a database
7016532, Nov 06 2000 NANT HOLDINGS IP, LLC Image capture and identification system and process
7096152, Jul 20 2005 DMT Solutions Global Corporation Method and apparatus for determining weight of moving mailpieces
7121458, Aug 31 1999 United States Postal Services Apparatus and methods for identifying and processing mail using an identification code
7171049, Dec 15 2000 POSTAL SERVICE, UNITED STATES Method and apparatus for alphanumeric recognition
7204415, Dec 29 2003 United States Postal Service Methods and systems for providing secondary address information
7212949, Aug 31 2004 BLUEHALO LABS, LLC Automated system and method for tool mark analysis
7477780, Nov 05 2002 NANT HOLDINGS IP, LLC Image capture and identification system and process
7518080, Dec 15 2000 United States Postal Service Just-in-time sort plan creation
7674995, Mar 24 2005 Solystic Method of processing postal items including management of digital fingerprints of the postal items
7720256, Jun 26 2002 Solystic Idenitfication tag for postal objects by image signature and associated mail handling
7726548, Feb 25 2004 ecoEnvelopes, LLC Reusable envelope structures and methods
7822263, Dec 28 2005 Method and apparatus for alignment, comparison and identification of characteristic tool marks, including ballistic signatures
7853792, Mar 12 2004 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
8022832, Feb 15 2007 EProvenance, LLC Methods and systems for certifying provenance of alcoholic beverages
8108309, May 29 2007 Provalidate Protecting a manufactured item from counterfeiting
8180667, Jun 03 2008 GOOGLE LLC Rewarding creative use of product placements in user-contributed videos
8194938, Jun 02 2009 GEORGE MASON INTELLECTUAL PROPERTIES, INC Face authentication using recognition-by-parts, boosting, and transduction
8374399, Mar 29 2009 SICPA HOLDING SA Apparatus for authenticating standardized documents
8374920, Jan 21 2009 NIKE, Inc Anti-counterfeiting system and method
8391583, Apr 15 2009 Cummins-Allison Corp Apparatus and system for imaging currency bills and financial documents and method for using the same
8428772, Sep 07 2007 Solystic Method of processing mailpieces using customer codes associated with digital fingerprints
8437530, Sep 27 2001 Cummins-Allison Corp Apparatus and system for imaging currency bills and financial documents and method for using the same
8457354, Jul 09 2010 Target Brands, Inc. Movement timestamping and analytics
8477992, Apr 26 2007 Bell and Howell, LLC Document processing system control using document feature analysis for identification
8520888, Apr 26 2007 Bell and Howell, LLC Apparatus, method and programmable product for identification of a document with feature analysis
8526743, Nov 01 2010 RAF SOFTWARE TECHNOLOGY INC Defined data patterns for object handling
8774455, Mar 02 2011 ALITHEON, INC Document fingerprinting
9031329, May 02 2012 TRUEPIC INC Photo forensics using image signatures
9058543, Nov 01 2010 RAF SOFTWARE TECHNOLOGY INC Defined data patterns for object handling
9152862, Sep 15 2011 ALITHEON, INC Object identification and inventory management
9170654, Nov 06 2000 NANT HOLDINGS IP, LLC Object information derived from object images
9224196, Mar 12 2014 ClearMark Systems, LLC System and method for authentication
9234843, Aug 25 2011 Alliance for Sustainable Energy, LLC On-line, continuous monitoring in solar cell and fuel cell manufacturing using spectral reflectance imaging
9245133, May 24 2000 Copilot Ventures Fund III LLC Authentication method and system
9350552, Mar 02 2011 ALITHEON, INC Document fingerprinting
9350714, Nov 19 2013 GLOBALFOUNDRIES U S INC Data encryption at the client and server level
9361596, Oct 04 2011 RAF SOFTWARE TECHNOLOGY INC In-field device for de-centralized workflow automation
9443298, Mar 02 2012 ALITHEON, INC Digital fingerprinting object authentication and anti-counterfeiting system
9558463, Oct 04 2011 RAF SOFTWARE TECHNOLOGY INC In-field device for de-centralized workflow automation
9582714, Mar 02 2011 ALITHEON, INC Digital fingerprinting track and trace system
9646206, Sep 15 2011 ALITHEON, INC Object identification and inventory management
20010010334,
20010054031,
20020015515,
20020073049,
20020168090,
20030015395,
20030046103,
20030091724,
20030120677,
20030179931,
20030182018,
20030208298,
20040027630,
20040101174,
20040112962,
20040218791,
20040218801,
20050007776,
20050065719,
20050086256,
20050111618,
20050119786,
20050131576,
20050137882,
20050160271,
20050169529,
20050188213,
20050204144,
20050251285,
20050257064,
20050289061,
20060010503,
20060083414,
20060109520,
20060131518,
20060177104,
20060253406,
20070071291,
20070085710,
20070094155,
20070211651,
20070211964,
20070230656,
20070263267,
20070282900,
20080011841,
20080128496,
20080130947,
20080219503,
20080250483,
20080255758,
20080272585,
20080290005,
20080294474,
20090028379,
20090057207,
20090106042,
20090134222,
20090154778,
20090157733,
20090223099,
20090232361,
20090245652,
20090271029,
20090287498,
20090307005,
20100027834,
20100070527,
20100104200,
20100157064,
20100163612,
20100166303,
20100174406,
20110026831,
20110064279,
20110081043,
20110091068,
20110161117,
20110188709,
20110194780,
20110235920,
20110267192,
20120042171,
20120089639,
20120130868,
20120177281,
20120185393,
20120199651,
20120242481,
20120243797,
20120250945,
20130214164,
20130277425,
20130284803,
20140032322,
20140140570,
20140140571,
20140184843,
20140201094,
20140270341,
20140314283,
20140380446,
20150058142,
20150067346,
20150078629,
20150086068,
20150117701,
20150127430,
20150248587,
20150294189,
20150309502,
20150371087,
20160034914,
20160055651,
20160057138,
20160117631,
20160162734,
20160180546,
20160189510,
20160335520,
20170004444,
20170032285,
20170132458,
20170243230,
20170243232,
20170243233,
20170253069,
20170295301,
20170300905,
20170344823,
20170372327,
20180012008,
20180018627,
20180018838,
20180024074,
20180024178,
20180047128,
20180053312,
20180121643,
20180144211,
20180315058,
20180349694,
20190026581,
20190034694,
20190102873,
20190228174,
20190287118,
20200153822,
20200226366,
20200233901,
20200257791,
DE102006005927,
EP439669,
EP759596,
EP1016548,
EP1719070,
EP2107506,
EP2166493,
EP2195621,
EP2257909,
EP2866193,
EP2869240,
EP2869241,
EP3208744,
EP3249581,
EP3270342,
EP3435287,
GB2097979,
GB2482127,
JP2007213148,
JP61234481,
KR20120009654,
WO2005086616,
WO2006038114,
WO2007028799,
WO2007031176,
WO2007071788,
WO2007090437,
WO2007144598,
WO2009030853,
WO2009089126,
WO2009115611,
WO2010018464,
WO2012145842,
WO2013126221,
WO2013173408,
WO2015004434,
WO2016081831,
////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Feb 02 2020ROSS, DAVID JUSTINALITHEON, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0522530461 pdf
Feb 02 2020SHANNON, WILL CHARLESALITHEON, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0522530461 pdf
Feb 02 2020QIAN, CHENGALITHEON, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0522530461 pdf
Feb 03 2020Alitheon, Inc.(assignment on the face of the patent)
Date Maintenance Fee Events
Feb 03 2020BIG: Entity status set to Undiscounted (note the period is included in the code).
Feb 20 2020SMAL: Entity status set to Small.
Sep 30 2024M2551: Payment of Maintenance Fee, 4th Yr, Small Entity.


Date Maintenance Schedule
Mar 30 20244 years fee payment window open
Sep 30 20246 months grace period start (w surcharge)
Mar 30 2025patent expiry (for year 4)
Mar 30 20272 years to revive unintentionally abandoned end. (for year 4)
Mar 30 20288 years fee payment window open
Sep 30 20286 months grace period start (w surcharge)
Mar 30 2029patent expiry (for year 8)
Mar 30 20312 years to revive unintentionally abandoned end. (for year 8)
Mar 30 203212 years fee payment window open
Sep 30 20326 months grace period start (w surcharge)
Mar 30 2033patent expiry (for year 12)
Mar 30 20352 years to revive unintentionally abandoned end. (for year 12)